(1) copy the header of the suspicious email. I guess this is what a header is. I copied it from a test email. The info is used by eBay to trace where the spam came from:
Status: U
Return-Path:
Received: from mx-dipper.atl.sa.earthlink.net ([127.0.0.1])by mx-dipper.atl.sa.earthlink.net (EarthLink SMTP Server) with SMTP id 1liQdf4WM3Nl36u0; Fri, 2 Jan 2009 15:01:41 -0500 (EST)
Received: from elasmtp-curtail.atl.sa.earthlink.net ([209.86.89.64])by mx-dipper.atl.sa.earthlink.net (EarthLink SMTP Server) with ESMTP id 1liQdf2k63Nl36u0
for ; Fri, 2 Jan 2009 15:01:41 -0500 (EST)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;
s=dk20050327; d=ix.netcom.com;
b=V02eF/huAw1mBNztaKMHwICcsXTbXgIqaclmTcnDaPIGjhbUgFrfwegNUzTw3rnX;
h=Received:User-Agent:Date:Subject:From:To:Message-ID:Mime-version:Content-type:X-ELNK-Trace:X-Originating-IP;
Received: from [76.15.208.170] (helo=[10.0.1.200])by elasmtp-curtail.atl.sa.earthlink.net with esmtpa (Exim 4.67)
(envelope-from )
id 1LIqCp-0000yF-SQ
for chipe@ix.netcom.com; Fri, 02 Jan 2009 15:01:15 -0500
User-Agent: Microsoft-Entourage/10.0.0.1309
Date: Fri, 02 Jan 2009 15:02:55 -0500
Subject: Test
From: Robert Eisenstadt
To: Robert Eisenstadt
Message-ID:
Mime-version: 1.0
Content-type: multipart/alternative; boundary="B_3313753376_421319"
X-ELNK-Trace: 2b71d4a3ba9e2023372ac5f331c5652939459df5db849713172bba038fa00c3a17c48cb3d37842b6350badd9bab72f9c350badd9bab72f9c350badd9bab72f9c
X-Originating-IP: 76.15.208.170
X-ELNK-Received-Info: spv=0;
X-ELNK-AV: 0
X-ELNK-Info: sbv=0; sbrc=.0; sbf=00; sbw=010;
(2) click the email "forward" (similar to 'reply") button.
(3) paste the header (see (1) above) to the top of the new email.
(4) put "spoof@ebay.com>" into the address of the email. (If it regarded PayPal, I address it "spoof@paypal.com.")
(5) send it off.
Robert
|